blob: 6120670749055ddb43174c606d3d5eceaf41ecd6 [file] [log] [blame]
Avi Kivity26eef702008-07-03 14:59:22 +03001#ifndef ARCH_X86_KVM_X86_H
2#define ARCH_X86_KVM_X86_H
3
Michael S. Tsirkin668fffa2017-04-21 12:27:17 +02004#include <asm/processor.h>
5#include <asm/mwait.h>
Avi Kivity26eef702008-07-03 14:59:22 +03006#include <linux/kvm_host.h>
Marcelo Tosatti8d93c872016-06-20 22:28:02 -03007#include <asm/pvclock.h>
Avi Kivity3eeb3282010-01-21 15:31:48 +02008#include "kvm_cache_regs.h"
Avi Kivity26eef702008-07-03 14:59:22 +03009
Radim Krčmář74545702015-04-27 15:11:25 +020010#define MSR_IA32_CR_PAT_DEFAULT 0x0007040600070406ULL
11
Avi Kivity26eef702008-07-03 14:59:22 +030012static inline void kvm_clear_exception_queue(struct kvm_vcpu *vcpu)
13{
14 vcpu->arch.exception.pending = false;
15}
16
Gleb Natapov66fd3f72009-05-11 13:35:50 +030017static inline void kvm_queue_interrupt(struct kvm_vcpu *vcpu, u8 vector,
18 bool soft)
Avi Kivity937a7ea2008-07-03 15:17:01 +030019{
20 vcpu->arch.interrupt.pending = true;
Gleb Natapov66fd3f72009-05-11 13:35:50 +030021 vcpu->arch.interrupt.soft = soft;
Avi Kivity937a7ea2008-07-03 15:17:01 +030022 vcpu->arch.interrupt.nr = vector;
23}
24
25static inline void kvm_clear_interrupt_queue(struct kvm_vcpu *vcpu)
26{
27 vcpu->arch.interrupt.pending = false;
28}
29
Gleb Natapov3298b752009-05-11 13:35:46 +030030static inline bool kvm_event_needs_reinjection(struct kvm_vcpu *vcpu)
31{
32 return vcpu->arch.exception.pending || vcpu->arch.interrupt.pending ||
33 vcpu->arch.nmi_injected;
34}
Gleb Natapov66fd3f72009-05-11 13:35:50 +030035
36static inline bool kvm_exception_is_soft(unsigned int nr)
37{
38 return (nr == BP_VECTOR) || (nr == OF_VECTOR);
39}
Gleb Natapovfc61b802009-07-05 17:39:35 +030040
Avi Kivity3eeb3282010-01-21 15:31:48 +020041static inline bool is_protmode(struct kvm_vcpu *vcpu)
42{
43 return kvm_read_cr0_bits(vcpu, X86_CR0_PE);
44}
45
Avi Kivity836a1b32010-01-21 15:31:49 +020046static inline int is_long_mode(struct kvm_vcpu *vcpu)
47{
48#ifdef CONFIG_X86_64
Avi Kivityf6801df2010-01-21 15:31:50 +020049 return vcpu->arch.efer & EFER_LMA;
Avi Kivity836a1b32010-01-21 15:31:49 +020050#else
51 return 0;
52#endif
53}
54
Nadav Amit57773922014-06-18 17:19:23 +030055static inline bool is_64_bit_mode(struct kvm_vcpu *vcpu)
56{
57 int cs_db, cs_l;
58
59 if (!is_long_mode(vcpu))
60 return false;
61 kvm_x86_ops->get_cs_db_l_bits(vcpu, &cs_db, &cs_l);
62 return cs_l;
63}
64
Joerg Roedel6539e732010-09-10 17:30:50 +020065static inline bool mmu_is_nested(struct kvm_vcpu *vcpu)
66{
67 return vcpu->arch.walk_mmu == &vcpu->arch.nested_mmu;
68}
69
Avi Kivity836a1b32010-01-21 15:31:49 +020070static inline int is_pae(struct kvm_vcpu *vcpu)
71{
72 return kvm_read_cr4_bits(vcpu, X86_CR4_PAE);
73}
74
75static inline int is_pse(struct kvm_vcpu *vcpu)
76{
77 return kvm_read_cr4_bits(vcpu, X86_CR4_PSE);
78}
79
80static inline int is_paging(struct kvm_vcpu *vcpu)
81{
Davidlohr Buesoc36fc042012-03-08 12:45:54 +010082 return likely(kvm_read_cr0_bits(vcpu, X86_CR0_PG));
Avi Kivity836a1b32010-01-21 15:31:49 +020083}
84
Joerg Roedel24d1b152010-12-07 17:15:05 +010085static inline u32 bit(int bitno)
86{
87 return 1 << (bitno & 31);
88}
89
Xiao Guangrongbebb1062011-07-12 03:23:20 +080090static inline void vcpu_cache_mmio_info(struct kvm_vcpu *vcpu,
91 gva_t gva, gfn_t gfn, unsigned access)
92{
93 vcpu->arch.mmio_gva = gva & PAGE_MASK;
94 vcpu->arch.access = access;
95 vcpu->arch.mmio_gfn = gfn;
David Matlack56f17dd2014-08-18 15:46:07 -070096 vcpu->arch.mmio_gen = kvm_memslots(vcpu->kvm)->generation;
97}
98
99static inline bool vcpu_match_mmio_gen(struct kvm_vcpu *vcpu)
100{
101 return vcpu->arch.mmio_gen == kvm_memslots(vcpu->kvm)->generation;
Xiao Guangrongbebb1062011-07-12 03:23:20 +0800102}
103
104/*
David Matlack56f17dd2014-08-18 15:46:07 -0700105 * Clear the mmio cache info for the given gva. If gva is MMIO_GVA_ANY, we
106 * clear all mmio cache info.
Xiao Guangrongbebb1062011-07-12 03:23:20 +0800107 */
David Matlack56f17dd2014-08-18 15:46:07 -0700108#define MMIO_GVA_ANY (~(gva_t)0)
109
Xiao Guangrongbebb1062011-07-12 03:23:20 +0800110static inline void vcpu_clear_mmio_info(struct kvm_vcpu *vcpu, gva_t gva)
111{
David Matlack56f17dd2014-08-18 15:46:07 -0700112 if (gva != MMIO_GVA_ANY && vcpu->arch.mmio_gva != (gva & PAGE_MASK))
Xiao Guangrongbebb1062011-07-12 03:23:20 +0800113 return;
114
115 vcpu->arch.mmio_gva = 0;
116}
117
118static inline bool vcpu_match_mmio_gva(struct kvm_vcpu *vcpu, unsigned long gva)
119{
David Matlack56f17dd2014-08-18 15:46:07 -0700120 if (vcpu_match_mmio_gen(vcpu) && vcpu->arch.mmio_gva &&
121 vcpu->arch.mmio_gva == (gva & PAGE_MASK))
Xiao Guangrongbebb1062011-07-12 03:23:20 +0800122 return true;
123
124 return false;
125}
126
127static inline bool vcpu_match_mmio_gpa(struct kvm_vcpu *vcpu, gpa_t gpa)
128{
David Matlack56f17dd2014-08-18 15:46:07 -0700129 if (vcpu_match_mmio_gen(vcpu) && vcpu->arch.mmio_gfn &&
130 vcpu->arch.mmio_gfn == gpa >> PAGE_SHIFT)
Xiao Guangrongbebb1062011-07-12 03:23:20 +0800131 return true;
132
133 return false;
134}
135
Nadav Amit57773922014-06-18 17:19:23 +0300136static inline unsigned long kvm_register_readl(struct kvm_vcpu *vcpu,
137 enum kvm_reg reg)
138{
139 unsigned long val = kvm_register_read(vcpu, reg);
140
141 return is_64_bit_mode(vcpu) ? val : (u32)val;
142}
143
Nadav Amit27e6fb52014-06-18 17:19:26 +0300144static inline void kvm_register_writel(struct kvm_vcpu *vcpu,
145 enum kvm_reg reg,
146 unsigned long val)
147{
148 if (!is_64_bit_mode(vcpu))
149 val = (u32)val;
150 return kvm_register_write(vcpu, reg, val);
151}
152
Paolo Bonzini41dbc6b2015-07-23 08:22:45 +0200153static inline bool kvm_check_has_quirk(struct kvm *kvm, u64 quirk)
154{
155 return !(kvm->arch.disabled_quirks & quirk);
156}
157
Zhang, Yanminff9d07a2010-04-19 13:32:45 +0800158void kvm_before_handle_nmi(struct kvm_vcpu *vcpu);
159void kvm_after_handle_nmi(struct kvm_vcpu *vcpu);
Nicholas Krausebab5bb32015-01-01 22:05:18 -0500160void kvm_set_pending_timer(struct kvm_vcpu *vcpu);
Serge E. Hallyn71f98332011-04-13 09:12:54 -0500161int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip);
Zhang, Yanminff9d07a2010-04-19 13:32:45 +0800162
Will Auld8fe8ab42012-11-29 12:42:12 -0800163void kvm_write_tsc(struct kvm_vcpu *vcpu, struct msr_data *msr);
Paolo Bonzini108b2492016-09-01 14:21:03 +0200164u64 get_kvmclock_ns(struct kvm *kvm);
Zachary Amsden99e3e302010-08-19 22:07:17 -1000165
Nadav Har'El064aea72011-05-25 23:04:56 +0300166int kvm_read_guest_virt(struct x86_emulate_ctxt *ctxt,
167 gva_t addr, void *val, unsigned int bytes,
168 struct x86_exception *exception);
169
Nadav Har'El6a4d7552011-05-25 23:08:00 +0300170int kvm_write_guest_virt_system(struct x86_emulate_ctxt *ctxt,
171 gva_t addr, void *val, unsigned int bytes,
172 struct x86_exception *exception);
173
Xiao Guangrong19efffa2015-06-15 16:55:31 +0800174void kvm_vcpu_mtrr_init(struct kvm_vcpu *vcpu);
Xiao Guangrongff536042015-06-15 16:55:22 +0800175u8 kvm_mtrr_get_guest_memory_type(struct kvm_vcpu *vcpu, gfn_t gfn);
Nadav Amit45666542014-09-18 22:39:44 +0300176bool kvm_mtrr_valid(struct kvm_vcpu *vcpu, u32 msr, u64 data);
Xiao Guangrongff536042015-06-15 16:55:22 +0800177int kvm_mtrr_set_msr(struct kvm_vcpu *vcpu, u32 msr, u64 data);
178int kvm_mtrr_get_msr(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata);
Xiao Guangrong6a39bbc2015-06-15 16:55:35 +0800179bool kvm_mtrr_check_gfn_range_consistency(struct kvm_vcpu *vcpu, gfn_t gfn,
180 int page_num);
Feng Wu520040142016-01-25 16:53:33 +0800181bool kvm_vector_hashing_enabled(void);
Nadav Amit45666542014-09-18 22:39:44 +0300182
Dave Hansend91cab72015-09-02 16:31:26 -0700183#define KVM_SUPPORTED_XCR0 (XFEATURE_MASK_FP | XFEATURE_MASK_SSE \
184 | XFEATURE_MASK_YMM | XFEATURE_MASK_BNDREGS \
Huaitong Han17a511f2016-03-22 16:51:16 +0800185 | XFEATURE_MASK_BNDCSR | XFEATURE_MASK_AVX512 \
186 | XFEATURE_MASK_PKRU)
Avi Kivity00b27a32011-11-23 16:30:32 +0200187extern u64 host_xcr0;
188
Paolo Bonzini4ff41732014-02-24 12:15:16 +0100189extern u64 kvm_supported_xcr0(void);
190
Marcelo Tosatti9ed96e82014-01-06 12:00:02 -0200191extern unsigned int min_timer_period_us;
192
Marcelo Tosattid0659d92014-12-16 09:08:15 -0500193extern unsigned int lapic_timer_advance_ns;
194
Gleb Natapov54e98182012-08-05 15:58:32 +0300195extern struct static_key kvm_no_apic_vcpu;
Paolo Bonzinib51012d2016-01-22 11:39:22 +0100196
Marcelo Tosatti8d93c872016-06-20 22:28:02 -0300197static inline u64 nsec_to_cycles(struct kvm_vcpu *vcpu, u64 nsec)
198{
199 return pvclock_scale_delta(nsec, vcpu->arch.virtual_tsc_mult,
200 vcpu->arch.virtual_tsc_shift);
201}
202
Paolo Bonzinib51012d2016-01-22 11:39:22 +0100203/* Same "calling convention" as do_div:
204 * - divide (n << 32) by base
205 * - put result in n
206 * - return remainder
207 */
208#define do_shl32_div32(n, base) \
209 ({ \
210 u32 __quot, __rem; \
211 asm("divl %2" : "=a" (__quot), "=d" (__rem) \
212 : "rm" (base), "0" (0), "1" ((u32) n)); \
213 n = __quot; \
214 __rem; \
215 })
216
Michael S. Tsirkin668fffa2017-04-21 12:27:17 +0200217static inline bool kvm_mwait_in_guest(void)
218{
219 unsigned int eax, ebx, ecx, edx;
220
221 if (!cpu_has(&boot_cpu_data, X86_FEATURE_MWAIT))
222 return false;
223
224 switch (boot_cpu_data.x86_vendor) {
225 case X86_VENDOR_AMD:
226 /* All AMD CPUs have a working MWAIT implementation */
227 return true;
228 case X86_VENDOR_INTEL:
229 /* Handle Intel below */
230 break;
231 default:
232 return false;
233 }
234
235 /*
236 * Intel CPUs without CPUID5_ECX_INTERRUPT_BREAK are problematic as
237 * they would allow guest to stop the CPU completely by disabling
238 * interrupts then invoking MWAIT.
239 */
240 if (boot_cpu_data.cpuid_level < CPUID_MWAIT_LEAF)
241 return false;
242
243 cpuid(CPUID_MWAIT_LEAF, &eax, &ebx, &ecx, &edx);
244
245 if (!(ecx & CPUID5_ECX_INTERRUPT_BREAK))
246 return false;
247
248 return true;
249}
250
Avi Kivity26eef702008-07-03 14:59:22 +0300251#endif